CVE-2025-56224

A lack of rate limiting in the One-Time Password (OTP) verification endpoint of SigningHub v8.6.8 allows attackers to bypass verification via a bruteforce attack.
References
Link Resource
http://ascertia.com Product
http://signinghub.com Product
https://github.com/saykino/CVE-2025-56224 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ascertia:signinghub:*:*:*:*:*:*:*:*

History

27 Oct 2025, 13:45

Type Values Removed Values Added
First Time Ascertia
Ascertia signinghub
References () http://ascertia.com - () http://ascertia.com - Product
References () http://signinghub.com - () http://signinghub.com - Product
References () https://github.com/saykino/CVE-2025-56224 - () https://github.com/saykino/CVE-2025-56224 - Third Party Advisory
CPE cpe:2.3:a:ascertia:signinghub:*:*:*:*:*:*:*:*

21 Oct 2025, 16:15

Type Values Removed Values Added
CWE CWE-305 CWE-307
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 8.1

20 Oct 2025, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CWE CWE-305

20 Oct 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-20 13:15

Updated : 2025-10-27 13:45


NVD link : CVE-2025-56224

Mitre link : CVE-2025-56224

CVE.ORG link : CVE-2025-56224


JSON object : View

Products Affected

ascertia

  • signinghub
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts